-
1
-
-
44249114234
-
Privacy and security of personal information: economic incentives and technological solutions
-
Camp, L.J. & Lewis, S. (eds) - Kluwer, Dordrecht, The Netherlands.
-
Acquisti, A. (2004) Privacy and security of personal information: economic incentives and technological solutions. In: Economics of Information Security, Camp, L.J. & Lewis, S. (eds), pp. 179-186. Kluwer, Dordrecht, The Netherlands.
-
(2004)
Economics of Information Security
, pp. 179-186
-
-
Acquisti, A.1
-
2
-
-
84986120029
-
'It was a great system'- face-work and the discursive construction of technology during information systems development
-
Alvarez, R. (2001) 'It was a great system'- face-work and the discursive construction of technology during information systems development. Information Technology & People, 14, 385-405.
-
(2001)
Information Technology & People
, vol.14
, pp. 385-405
-
-
Alvarez, R.1
-
3
-
-
40249115077
-
Examining technology, structure and identity during an enterprise systems implementation
-
Alvarez, R. (2008) Examining technology, structure and identity during an enterprise systems implementation. Information Systems Journal, 18, 203-224.
-
(2008)
Information Systems Journal
, vol.18
, pp. 203-224
-
-
Alvarez, R.1
-
4
-
-
84951278888
-
-
Alvesson, M. & Willmott, H. (eds) Sage, London, UK.
-
Alvesson, M. & Willmott, H. (eds) (2003) Studying Management Critically. Sage, London, UK.
-
(2003)
Studying Management Critically
-
-
-
5
-
-
16244420769
-
Doing critical research in information systems: some further thoughts
-
Avgerou, C (2005) Doing critical research in information systems: some further thoughts. Information Systems Journal, 15, 103-109.
-
(2005)
Information Systems Journal
, vol.15
, pp. 103-109
-
-
Avgerou, C.1
-
6
-
-
33846027847
-
Circuits of power in creating de jure standards: shaping an international information systems security standard
-
special issue on standard making
-
Backhouse, J., Hsu, C.W. & Silva, L. (2006) Circuits of power in creating de jure standards: shaping an international information systems security standard. MIS Quarterly, 30, special issue on standard making, 413-438.
-
(2006)
MIS Quarterly
, vol.30
, pp. 413-438
-
-
Backhouse, J.1
Hsu, C.W.2
Silva, L.3
-
7
-
-
85025229028
-
Information technology, control and power: the centralization and decentralization debate revisited
-
Bloomfield, B. (1992) Information technology, control and power: the centralization and decentralization debate revisited. Journal of Management Studies, 29, 459-484.
-
(1992)
Journal of Management Studies
, vol.29
, pp. 459-484
-
-
Bloomfield, B.1
-
8
-
-
40249106176
-
Exploring the critical agenda in information systems research
-
doi:10.1111/j.1365-2575.2008.00295.x
-
Cecez-Kecmanovic, D., Klein, H.K. & Brooke, C. (2008) Exploring the critical agenda in information systems research. Information Systems Journal, 18, 123-135. doi:10.1111/j.1365-2575.2008.00295.x
-
(2008)
Information Systems Journal
, vol.18
, pp. 123-135
-
-
Cecez-Kecmanovic, D.1
Klein, H.K.2
Brooke, C.3
-
10
-
-
74549207774
-
Applying Habermas' validity claims as a standard for critical discourse analysis
-
Kaplan, B., Truex, D., Wood-Harper, T & DeGross, J. (eds) - Kluwer Academic Publishers, Dordrecht, The Netherlands.
-
Cukier, W., Bauer, R. & Middleton, C. (2004) Applying Habermas' validity claims as a standard for critical discourse analysis. In: Information Systems Research - Relevant Theory and Informed Practice, Kaplan, B., Truex, D., Wood-Harper, T & DeGross, J. (eds), pp. 233-258. Kluwer Academic Publishers, Dordrecht, The Netherlands.
-
(2004)
Information Systems Research - Relevant Theory and Informed Practice
, pp. 233-258
-
-
Cukier, W.1
Bauer, R.2
Middleton, C.3
-
11
-
-
0002667164
-
Disciplinary power in the modern corporation
-
Alvesson, M. & Willmott, H. (eds) - Sage, London, UK.
-
Deetz, S. (1992) Disciplinary power in the modern corporation. In: Critical Management Studies, Alvesson, M. & Willmott, H. (eds), pp. 21-45. Sage, London, UK.
-
(1992)
Critical Management Studies
, pp. 21-45
-
-
Deetz, S.1
-
12
-
-
70449576952
-
Realizing benefits of an information security program
-
Dhillon, G (2004) Realizing benefits of an information security program. Business Process Management Journal, 10, 21-22.
-
(2004)
Business Process Management Journal
, vol.10
, pp. 21-22
-
-
Dhillon, G.1
-
13
-
-
33744830087
-
Value-focused assessment of information system security in organizations
-
Dhillon, G. & Torkzadeh, G. (2006) Value-focused assessment of information system security in organizations. Information Systems Journal, 16, 293-314.
-
(2006)
Information Systems Journal
, vol.16
, pp. 293-314
-
-
Dhillon, G.1
Torkzadeh, G.2
-
15
-
-
25144436981
-
Do information security policies reduce the incidence of security breaches: an exploratory analysis
-
Doherty, N.F. & Fulford, H. (2005) Do information security policies reduce the incidence of security breaches: an exploratory analysis. Information Resources Management Journal, 18, 20-38.
-
(2005)
Information Resources Management Journal
, vol.18
, pp. 20-38
-
-
Doherty, N.F.1
Fulford, H.2
-
16
-
-
32444443168
-
Aligning the information security policy with the strategic information systems plan
-
Doherty, N.F. & Fulford, H. (2006) Aligning the information security policy with the strategic information systems plan. Computers & Security, 23, 55-63.
-
(2006)
Computers & Security
, vol.23
, pp. 55-63
-
-
Doherty, N.F.1
Fulford, H.2
-
17
-
-
70449596008
-
The information security policy unpacked: a critical study of the content of university policies
-
Doherty, N.F., Anastasakis, L. & Fulford, H. (2009) The information security policy unpacked: a critical study of the content of university policies. International Journal of Information Management, 29, 449-457.
-
(2009)
International Journal of Information Management
, vol.29
, pp. 449-457
-
-
Doherty, N.F.1
Anastasakis, L.2
Fulford, H.3
-
19
-
-
0142058507
-
Sociotechnical networks and information management in health care
-
Doolin, B. (1999) Sociotechnical networks and information management in health care. Accounting, Management & Information Technology, 9, 95-114.
-
(1999)
Accounting, Management & Information Technology
, vol.9
, pp. 95-114
-
-
Doolin, B.1
-
20
-
-
0001474322
-
Critical Discourse Analysis and the Marketization of Public Discourse: The Universities
-
Fairclough, N. (1993) Critical Discourse Analysis and the Marketization of Public Discourse: The Universities, Discourse & Society, 4, 133-168.
-
(1993)
Discourse & Society
, vol.4
, pp. 133-168
-
-
Fairclough, N.1
-
21
-
-
1642552018
-
-
Routledge, London, UK & New York, USA.
-
Fairclough, N. (2003) Analysing Discourse - Textual Analysis for Social Research, London & New York. Routledge, London, UK & New York, USA.
-
(2003)
Analysing Discourse - Textual Analysis for Social Research, London & New York
-
-
Fairclough, N.1
-
25
-
-
0003438491
-
-
Blackwell, Cambridge, UK.
-
Grint, K. & Woolgar, S. (1997) The Machine at Work: Technology, Work, and Organization. Blackwell, Cambridge, UK.
-
(1997)
The Machine at Work: Technology, Work, and Organization
-
-
Grint, K.1
Woolgar, S.2
-
28
-
-
33846126313
-
-
2nd edn. Routledge, London, UK.
-
Hawkes, D. (2003) Ideology, 2nd edn. Routledge, London, UK.
-
(2003)
Ideology
-
-
Hawkes, D.1
-
29
-
-
67650152666
-
Protection motivation and deterrence: a framework for security policy compliance in organisations
-
Herath, T. & Rao, H.R. (2009) Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18, 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
30
-
-
0039292695
-
Nachtrag zu 'Traditionelle und kritische Theorie'
-
Horkheimer, M, 1992, Suhrkamp, Frankfurt, Germany.
-
Horkheimer, M. (1937) Nachtrag zu 'Traditionelle und kritische Theorie'. In: Traditionelle und kritische Theorie, Horkheimer, M (ed.), 1992 pp. 261-269. Suhrkamp, Frankfurt, Germany.
-
(1937)
Traditionelle und kritische Theorie
, pp. 261-269
-
-
Horkheimer, M.1
-
31
-
-
33645861578
-
-
Palgrave McMillan, New York, USA.
-
How, A. (2003) Critical Theory. Palgrave McMillan, New York, USA.
-
(2003)
Critical Theory
-
-
How, A.1
-
33
-
-
33644972807
-
Rethinking critical theory and qualitative research
-
3rd edn, Denzin, N.K. & Lincoln, Y.S. (eds) - Sage, Thousand Oaks, CA, USA.
-
Kincheloe, JL & McLaren, P (2005) Rethinking critical theory and qualitative research. In: SAGE Handbook of Qualitative Research, 3rd edn, Denzin, N.K. & Lincoln, Y.S. (eds), pp. 305-342. Sage, Thousand Oaks, CA, USA.
-
(2005)
SAGE Handbook of Qualitative Research
, pp. 305-342
-
-
Kincheloe, J.L.1
McLaren, P.2
-
34
-
-
2442435192
-
The critical social theory of Jürgen Habermas and its implications for IS research
-
Mingers, J. & Willcocks, L. (eds) - Wiley, Chichester, UK.
-
Klein, H.K. & Huynh, M.Q. (2004) The critical social theory of Jürgen Habermas and its implications for IS research. In: Social Theory and Philosophy for Information Systems, Mingers, J. & Willcocks, L. (eds), pp. 157-237. Wiley, Chichester, UK.
-
(2004)
Social Theory and Philosophy for Information Systems
, pp. 157-237
-
-
Klein, H.K.1
Huynh, M.Q.2
-
36
-
-
9744229973
-
Informating the clan: controlling physicians' costs and outcomes
-
Kohli, R. & Kettinger, W.J. (2004) Informating the clan: controlling physicians' costs and outcomes. MIS Quarterly, 28, 363-394.
-
(2004)
MIS Quarterly
, vol.28
, pp. 363-394
-
-
Kohli, R.1
Kettinger, W.J.2
-
37
-
-
84855234180
-
-
A security model for military message systems: retrospective. [WWW document]. URL (accessed 4 January 2006).
-
Landwehr, C.E., Heitmeyer, C.L. & McLean, J.D. (2001) A security model for military message systems: retrospective. [WWW document]. URL (accessed 4 January 2006).
-
(2001)
-
-
Landwehr, C.E.1
Heitmeyer, C.L.2
McLean, J.D.3
-
38
-
-
0002994697
-
Information Systems and Critical Theory
-
M. Alvesson and H. Willmott (eds) - Sage Publications, London, UK.
-
Lyytinen, K. (1992) Information Systems and Critical Theory. In: Critical Management Studies, M. Alvesson and H. Willmott (eds), pp. 159-180. Sage Publications, London, UK.
-
(1992)
Critical Management Studies
, pp. 159-180
-
-
Lyytinen, K.1
-
39
-
-
16244406605
-
Doing critical research in information systems: a case of theory and practice not informing each other
-
McGrath, K. (2005) Doing critical research in information systems: a case of theory and practice not informing each other. Information Systems Journal, 15, 85-101.
-
(2005)
Information Systems Journal
, vol.15
, pp. 85-101
-
-
McGrath, K.1
-
40
-
-
79959546460
-
A set of principles for conducting critical research in information systems
-
Myers, M.D. & Klein, H.K. (2011) A set of principles for conducting critical research in information systems. MIS Quarterly, 35, 17-36.
-
(2011)
MIS Quarterly
, vol.35
, pp. 17-36
-
-
Myers, M.D.1
Klein, H.K.2
-
41
-
-
0000395003
-
Communication richness in electronic mail: critical social theory and the contextuality of meaning
-
Ngwenyama, O.K. & Lee, A.S. (1997) Communication richness in electronic mail: critical social theory and the contextuality of meaning. MIS Quarterly, 21, 145-167.
-
(1997)
MIS Quarterly
, vol.21
, pp. 145-167
-
-
Ngwenyama, O.K.1
Lee, A.S.2
-
42
-
-
84855234181
-
-
Users and trust in cyberspace. Cambridge Security Protocoll Workshop, 3-5 July, 2000 Cambridge, England.
-
Nikander, P. & Karvonen, K. (2000) Users and trust in cyberspace. Cambridge Security Protocoll Workshop, 3-5 July, 2000 Cambridge, England.
-
(2000)
-
-
Nikander, P.1
Karvonen, K.2
-
43
-
-
31144461818
-
Where computer security meets national security
-
Nissenbaum, H. (2005) Where computer security meets national security. Ethics and Information Technology, 7, 61-73.
-
(2005)
Ethics and Information Technology
, vol.7
, pp. 61-73
-
-
Nissenbaum, H.1
-
44
-
-
18444382520
-
Management information systems research: what's there in a methodology?
-
Palvia, P., Mao, E., Salam, A.F. & Soliman, K. (2003) Management information systems research: what's there in a methodology? Communications of the Association for Information Systems, 11, 289-309.
-
(2003)
Communications of the Association for Information Systems
, vol.11
, pp. 289-309
-
-
Palvia, P.1
Mao, E.2
Salam, A.F.3
Soliman, K.4
-
45
-
-
0001586794
-
Critical theory and accounting
-
Alvesson, M. & Willmott, H. (eds) - Sage, London, UK.
-
Power, M. & Laughlin, R. (1992) Critical theory and accounting. In: Critical Management Studies, Alvesson, M. & Willmott, H. (eds), pp. 113-135. Sage, London, UK.
-
(1992)
Critical Management Studies
, pp. 113-135
-
-
Power, M.1
Laughlin, R.2
-
47
-
-
1142273446
-
PFIRES: a policy framework for information security
-
Rees, J., Bandyopadhyay, S. & Spafford, E.H. (2003) PFIRES: a policy framework for information security. Communications of the ACM, 46, 101-106.
-
(2003)
Communications of the ACM
, vol.46
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.H.3
-
48
-
-
34249995956
-
The mysterious case of the missing paradigm: a review of critical information systems research 1991-2001
-
Richardson, H. & Robinson, B. (2007) The mysterious case of the missing paradigm: a review of critical information systems research 1991-2001. Information Systems Journal, 17, 251-270.
-
(2007)
Information Systems Journal
, vol.17
, pp. 251-270
-
-
Richardson, H.1
Robinson, B.2
-
49
-
-
0013064970
-
Studying knowledge management in information systems research: discourses and theoretical assumptions
-
Schultze, U. & Leidner, D. (2002) Studying knowledge management in information systems research: discourses and theoretical assumptions. MIS Quarterly, 26, 213-242.
-
(2002)
MIS Quarterly
, vol.26
, pp. 213-242
-
-
Schultze, U.1
Leidner, D.2
-
50
-
-
84870957440
-
-
Power and practice in information systems security research. In: Proceedings of the Twenty Ninth International Conference on Information Systems. Paris.
-
Siponen, M., Willison, R. & Baskerville, R. (2008) Power and practice in information systems security research. In: Proceedings of the Twenty Ninth International Conference on Information Systems. Paris.
-
(2008)
-
-
Siponen, M.1
Willison, R.2
Baskerville, R.3
-
51
-
-
24644436394
-
Analysis of modern is security development approaches: towards the next generation of social and adaptable ISS methods
-
Siponen, M.T. (2005) Analysis of modern is security development approaches: towards the next generation of social and adaptable ISS methods. Information and Organization, 15, 339-375.
-
(2005)
Information and Organization
, vol.15
, pp. 339-375
-
-
Siponen, M.T.1
-
53
-
-
2642578963
-
Responsibility for information assurance and privacy: a problem of individual ethics?
-
Stahl, B.C. (2004) Responsibility for information assurance and privacy: a problem of individual ethics? Journal of Organizational and End User Computing, 16, 59-77.
-
(2004)
Journal of Organizational and End User Computing
, vol.16
, pp. 59-77
-
-
Stahl, B.C.1
-
54
-
-
15844380346
-
Learning about being critical
-
Walsham, G. (2005) Learning about being critical. Information Systems Journal, 15, 111-117.
-
(2005)
Information Systems Journal
, vol.15
, pp. 111-117
-
-
Walsham, G.1
-
55
-
-
84902506288
-
From critical theory into information systems practice: a case study of a payroll-personnel system
-
In, IFIP 8.2 Proceedings), Kaplan, B., Truex, D.P., Wastell, D., Wood-Harper, A.T. & DeGross, J. (eds) - Kluwer, Dordrecht, The Netherlands.
-
Waring, T. (2004) From critical theory into information systems practice: a case study of a payroll-personnel system. In: Information Systems Research: Relevant Theory and Informed Practice, (IFIP 8.2 Proceedings), Kaplan, B., Truex, D.P., Wastell, D., Wood-Harper, A.T. & DeGross, J. (eds), pp. 556-575. Kluwer, Dordrecht, The Netherlands.
-
(2004)
Information Systems Research: Relevant Theory and Informed Practice
, pp. 556-575
-
-
Waring, T.1
-
57
-
-
51349158689
-
Security lapses and the omission of information security measures: a threat control model and empirical test
-
Workman, M., Bommer, W.H. & Straub, D. (2008) Security lapses and the omission of information security measures: a threat control model and empirical test. Computers in Human Behavior, 24, 2799-2816.
-
(2008)
Computers in Human Behavior
, vol.24
, pp. 2799-2816
-
-
Workman, M.1
Bommer, W.H.2
Straub, D.3
|